Exploiting these issues may allow an attacker to crash the application and deny service to legitimate users. An attacker may also execute arbitrary code in the context of the user running a vulnerable version of the application.